Database incident table, Database Management System

The Incident table, with an auto-incrementing incident number, etc, looks like:

incident_num

reporter

date

time

incident_description

category

1

john1

2011-01-10

16:17:34

Can't remote login to AFS

network

2

bert456

2011-01-04

15:09:57

Password reset failed

system

4

john1

2010-12-29

15:10:59

DB Account requested

DB admin

Data sources:  The times and dates are internally generated by MySQL based on the data types used in the table. The remaining fields, with the exception of the Incident_num which is internally generated, are determined by the HTML form inputs.  Some form inputs are not inserted into the database but just used to guide processing [like the reporters indication as to whether they want an email copy of a submitted report,  or not].  Some inputs like the email address, and the reporter (name) and password are already in database tables, and are only accessed [retrieved] for purposes of controlling authentication or email authorization.  Some database columns, like the email limit for a reporter and their current number of sent emails, are entered manually using phpMyAdmin.  They may be accessed for decision-making [like the email limit for an address] and update by the program when an email is sent.

Posted Date: 3/29/2013 5:50:48 AM | Location : United States







Related Discussions:- Database incident table, Assignment Help, Ask Question on Database incident table, Get Answer, Expert's Help, Database incident table Discussions

Write discussion on Database incident table
Your posts are moderated
Related Questions
which component of DBMS can be embedded in a program? The data manipulation language (DML) is a component which is embedded in a program.

Can you scan double-sided documents - and remove blank pages? Our software and imaging systems supports duplex scanning, at the same time scanning both sides of a page. Program

Illustration of implementation of inheritance Let us take the illustration of implementation of inheritance. Suppose that we are about to implement the Stack class and by now w


Why were functional methods fashionable in early days? These are inspired directly by computer architecture and thus popular among computer scientist in early days. The divisio

List two restrictions that are applied on the modification (updation, insertion or deletion) of base tables through view.  Ans: The two restrictions are: 1. If a view

Clustering Indexes It may be an excellent idea to keep data of the students in the order of the programme they have registered as most of the data file accesses may need studen

Surgeons identified by doctor ID (DOCID) operate on patients identified by patient ID (PATID) in operating theaters identified by room numbers (ROOMNO). Each surgeon can operate on

DISADVANTAGES OF RDBMS

Describe the various types of Online Analytical Processing (OLAP) tools and briefly discuss how the support common analytical operations.